4Zero-Share Key Management for Secure Communication Across a Channel

Mahalingam P. R.* and Fasila K. A.

Department of Computer Science and Engineering,

Muthoot Institute of Technology and Science, Kochi, India

Abstract

Symmetric ciphers require transmission of a shared key over a seemingly insecure channel. In order to secure the channel, key transmission should be secured as much as possible. Here, we use the power of reversible matrix operations to implement key transmission in symmetric cryptosystems. The concept is based on reversible overlapping operations to add and remove layers of cipher on a plaintext. The advantage of this model is that the operations are independent of the key chosen, and do not require any components of the cipher system to be sent across the channel without protection. But this involves multiple transactions for sending each piece of information, and the same method can be implemented as a handshake. The keys at the host can be random, or based on the data to be sent across the channel. But at the same time handshakes can overload the channel if used over large data items. Hence, this method is adaptable for key transfers.

Keywords: Symmetric ciphers, handshake mechanism, matrix cipher, channel security, random keys

4.1 Introduction

The word cryptography refers to transforming meaningful information to unintelligible format, to facilitate secure transmission. Process of converting the plain message to a mangled form is termed as encryption

Get Design and Analysis of Security Protocol for Communication now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.